Date post: | 21-Dec-2015 |
Category: |
Documents |
View: | 214 times |
Download: | 0 times |
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY
MANAGEMENT SCHEME
Presented By:
Mohammed Saleh
CS 599a Fall06
BackgroundBackground
• 100/1000 nodes
• Low cost solution
• Limited resources
• Controlled or uncontrolled environment
WSN ArchitectureWSN Architecture
A sensor Nodes Consist of:• Battery• Memory• Processor• Radio links for communicating
Sensor Node ConstraintsSensor Node Constraints
• Battery Power/Energy
• Processor
• Rechargeability
• Sleep PatternsMemory
Network constraintsNetwork constraints
• Limited Pre-Configuration
• Unreliable communications
• Frequent Routing Changes
Security RequirementsSecurity Requirements
• Confidentiality• Authenticity• Integrity• Freshness• Scalability• Availability• Accessibility• Self-Organization• Flexibility
Security in Wireless NetworksSecurity in Wireless Networks
• Attacks• Poor physical protection• Attacks not only from outside butalso from within the network fromcompromised nodes.
Security in Wireless NetworksSecurity in Wireless Networks
Security concepts:
• Cryptography
- Public/private key
• Diffie hellman
Group key protocolGroup key protocol
• key establishment protocols can be classified into two categories:
• Group key management - Group key is usually created and updated by a central key server, and then securely
distributed to all members.
• Tree-based key management - each node contributes a fraction of the group key and the creation and update of group key are the joint work of all members.